When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. TCP/IP stack fingerprinting - Wikipedia

    en.wikipedia.org/wiki/TCP/IP_stack_fingerprinting

    Passive OS Fingerprinting method and diagram. TCP/IP stack fingerprinting is the remote detection of the characteristics of a TCP/IP stack implementation. The combination of parameters may then be used to infer the remote machine's operating system (aka, OS fingerprinting ), or incorporated into a device fingerprint .

  3. p0f - Wikipedia

    en.wikipedia.org/wiki/P0f

    p0f is a passive TCP/IP stack fingerprinting tool. p0f can attempt to identify the system running on machines that send network traffic to the box it is running on, or to a machine that shares a medium with the machine it is running on. p0f can also assist in analysing other aspects of the remote system.

  4. Nmap - Wikipedia

    en.wikipedia.org/wiki/Nmap

    With help and contributions of the computer security community, development continued. Enhancements included operating system fingerprinting, service fingerprinting, [11] code rewrites (C to C++), additional scan types, protocol support (e.g. IPv6, SCTP [24]) and new programs that complement Nmap's core features. Major releases include: [20]

  5. Kali Linux - Wikipedia

    en.wikipedia.org/wiki/Kali_Linux

    Kali Linux is a Linux distribution designed for digital forensics and penetration testing. [4] It is maintained and funded by Offensive Security . [ 5 ] The software is based on the Debian Testing branch: most packages Kali uses are imported from the Debian repositories . [ 6 ]

  6. Snort (software) - Wikipedia

    en.wikipedia.org/wiki/Snort_(software)

    The program can also be used to detect probes or attacks, including, but not limited to, operating system fingerprinting attempts, semantic URL attacks, buffer overflows, server message block probes, and stealth port scans. [11] Snort can be configured in three main modes: 1. sniffer, 2. packet logger, and 3. network intrusion detection. [12]

  7. BackTrack - Wikipedia

    en.wikipedia.org/wiki/BackTrack

    BackTrack was a Linux distribution that focused on security, based on the Knoppix Linux distribution aimed at digital forensics and penetration testing use. [4] In March 2013, the Offensive Security team rebuilt BackTrack around the Debian distribution and released it under the name Kali Linux.

  8. Kismet (software) - Wikipedia

    en.wikipedia.org/wiki/Kismet_(software)

    Kismet is used in a number of commercial and open source projects. It is distributed with Kali Linux. [3] It is used for wireless reconnaissance, [4] and can be used with other packages for an inexpensive wireless intrusion detection system. [5] It has been used in a number of peer reviewed studies such as "Detecting Rogue Access Points using ...

  9. Metasploit - Wikipedia

    en.wikipedia.org/wiki/Metasploit

    Metasploit runs on Unix (including Linux and macOS) and on Windows. The Metasploit Framework can be extended to use add-ons in multiple languages. To choose an exploit and payload, some information about the target system is needed, such as operating system version and installed network services.